Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Similar documents
Impact of Social Networks in Delay Tolerant Routing

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Friendship Based Routing in Delay Tolerant Mobile Social Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Impact of Social Networks on Delay Tolerant Routing

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking

Routing in Delay Tolerant Networks (DTN)

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Improvement of Buffer Scheme for Delay Tolerant Networks

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Integrated Routing Protocol for Opportunistic Networks

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks

Application of Graph Theory in DTN Routing

MDR Based Cooperative Strategy Adaptation in Wireless Communication

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

ANNALS of Faculty Engineering Hunedoara International Journal of Engineering

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

IN recent years, the amount of traffic has rapidly increased

Buffer Management in Delay Tolerant Networks

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

Max-Pivot Routing for Opportunistic Networks

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline

Analysis of Energy and Mobility Model on Opportunistic Routing Algorithms

Using local speed information as routing metric for delay tolerant networks

A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS

Simulation and Analysis of Opportunistic Routing Protocols

Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

Comparative Study of Routing Protocols for Opportunistic Networks

Research Article ISSN:

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

PAPER Two-Way Release Message Transmission and Its Wavelength Selection Rules for Preemption in OBS Networks

Capacity-Aware Routing Using Throw-Boxes

Trust Management for Encounter-Based Routing in Delay Tolerant Networks

Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks

Social-Aware Routing in Delay Tolerant Networks

Opportunistic Routing Algorithms in Delay Tolerant Networks

hash chains to provide efficient secure solutions for DSDV [7].

HCS: hierarchical cluster-based forwarding scheme for mobile social networks

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission

Community-Aware Opportunistic Routing in Mobile Social Networks

MaxHopCount: DTN congestion control algorithm under MaxProp routing

An Opportunistic On Routing Protocols and Persisting Challenges in Delay-Tolerant Networking

Studies with ns-2 and ns-3 based DTN Simulators

sensors ISSN

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

Overhead Reduction In Delay Tolerant Networks

SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Modeling Redundancy-based Routing in Delay Tolerant Networks

On Multicopy Opportunistic Forwarding Protocols in Nondeterministic Delay Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING

Privacy-enhanced social network routing in opportunistic networks

3R: Fine-grained Encounter-based Routing in Delay Tolerant Networks

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Social Properties Based Routing in Delay Tolerant Network

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks

High Throughput in MANET Using relay algorithm and rebroadcast probability

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

Peer-to-Peer Content sharing for Smart phones over Ad-Hoc Networks.

An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

Nodes Misbehavior in Vehicular Delay-Tolerant Networks

Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks

Lexicographical order Max-Min Fair Source Quota Allocation in Mobile Delay-Tolerant Networks

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Transcription:

, March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently, due to the rapid spread of wireless devices such as cell phones, mobile social networks have attracted considerable attention. In the mobile social networks, privacy issues have to be addressed and messages have to be transmitted effectively. In this paper, in order to resolve both the issues for the mobile social networks, we propose a reliable message transmission method. In our proposed method, each user classifies other users into two groups; reliable group and unreliable group. This classification is performed based on the number of timeseachuserisselectedasadestinationuserbyasourceuser. Based on this classification, all messages are forwarded to users in the reliable group. This can improve the reliability of message transmission. Moreover, this method utilizes the number of times a user encountered other users. This can decrease the number of hops for the message transmission, resulting in the efficient message transmission. We evaluate the performance of our proposed method with simulation. In numerical examples, we compare the performance of our proposed method with those of other methods. Numerical examples show that our proposed method can transmit messages reliably and effectively. Index Terms Mobile social networks, Reliability, User grouping, Message transmission, Performance evaluation I. INTRODUCTION SOCIAL networks are one of the latest and most interesting revolutions in network technology. In the social networks, users with common interests can connect each other and exchange information [1]. Currently, several kinds of applications such as Facebook, Twitter, MySpace, and LinkedIn have been utilized worldwide. Moreover, due to the rapid spread of wireless devices such as cell phones, mobile social networks have attracted considerable attention recently. Mobile social networks are social networks that can be utilized in mobile environments [2], and mobile social network services have gained popularity among users nowadays [3]. In vehicle environments, [1] has considered an innovative solution for providing mobile social network services. In the solution, IMS (IP multimedia subsystem) and M2M (machine to machine capabilities) have been utilized. In [3], authors have proposed and implemented a new application called CenceMe. In this application, the presence of individuals is inferred by using a mobile phone, and the information about the inference is shared through social networking applications such as Facebook and MySpace. The implementation of this application has been discussed for the Nokia N95 mobile phone. Moreover, in [4], an opened mobile social T. Yamamoto is with Graduate School of Engineering, University of Fukui, Fukui 910-8507, Japan. Email: takuro-y@network.fuis.u-fukui.ac.jp T. Tachibana is with Graduate School of Engineering, University of Fukui, Fukui 910-8507, Japan. Email:takuji-t@u-fukui.ac.jp networking system has been proposed for university students and faculties in a university campus. For the campus mobile social networks, some future applications have also been discussed. Here, in mobile social networks, a connectivity between two mobile devices (users) can be obtained only when one device gets into the transmission range of the other device. Moreover, each user does not know the state of the whole networks and have little information about the state of the partitioned network [5]. Due to such intermittent connectivity and lack of continuous end-to-end path [6], in mobile social networks, a message routing is one of the challenging problems. Hence, a lot of methods have been studied and proposed in the literature [2], [5], [7], [8]. In addition, for future mobile social networks, privacy issues have to be addressed [9]. Some studies have considered the privacy issues of location disclosure and guidelines on protecting privacy [10], [11], [12]. For the mobile networks, the utilization of security key management has been proposed to restrict user s access [12]. However, the key distribution and management are not easy in mobile social network environments [13]. Therefore, a reliable message transmission should be performed for the mobile social networks without the security key management. In this paper, we propose a reliable message transmission in mobile social networks. In our proposed method, a source user classifies other users into two groups; reliable group and unreliable group. This classification is performed by the source user based on the number of times each user is selected as a destination user. Based on this classification, all messages are forwarded to users in the reliable group. This can enhance the reliability of message transmission. Moreover, this method utilizes the number of times an user encountered other users. This can decrease the number of hops for the message transmission, resulting in the efficient message transmission. The performance of our proposed method is evaluated with simulation. In numerical examples, we compare the performance of our proposed method with that of other methods. The organization of this paper is as follows. Section II describes some routing methods for mobile social networks as related work. In Sect. III, we explain our proposed reliable message transmission in detail, and Sect. IV denotes numerical results. Finally, conclusions and future work are denoted in Sect. V. II. RELATED WORK In this section, we explain two message routing methods for mobile social networks as related work.

, March 12-14, 2014, Hong Kong Fig. 1. Encounter history among users,,and. A. Epidemic Routing In order to resolve intermittent connectivity, [7] has proposed a flooding-based routing called Epidemic routing. In the epidemic routing, a message is copied in each user before the user transmits it to other users. Then, the message is transmitted from the user to all users that are within a transmission range. Therefore, a destination user can receive its corresponding message with a high probability. On the other hand, in this routing, the number of hops becomes large and many users tend to have the same message. As a result, this routing is inefficient due to redundant message transmission. Fig. 2. Proposed rule of user grouping. Fig. 3. Number of encounters among users,,and. B. Friendship Routing In [2], authors have proposed a routing method called Friendship routing in order to transmit a message from a source user to a destination user effectively. In this method, the source user utilizes the information about the frequency of encountering other users. Now, denotes the remaining time at time until user encounters user.moreover,let be the remaining time at time until user encounters user after user encounters the user. Figure 1 shows an example of and. With and, two indexes and are derived from the following equations: From these indexes, the user determines whether it forwards a message to the user when the user is its destination user. By using this routing method, messages can be transmitted to those destination users effectively. III. PROPOSED METHOD In this section, we propose a reliable message transmission in mobile social networks. Our proposed method does not utilize security key management due to its complexity. Our proposed method consists of three parts: user grouping, encounter counting, and transmission algorithm. In the following subsections, we explain each part in detail. A. User grouping In our proposed method, each source user classifies other users into two groups; reliable group and unreliable group. Throughout this paper, we assume that a source user has strong relationship with a destination user and that such a destination user is reliable for the source user. Therefore, in (1) (2) this case, the reliability between two users can be considered for the message transmission with the above classification. Now, let be the number of users in a mobile social network and let be the number of messages that have been generated before time by user ( ). Moreover, let denote the number of messages whose destination user is. In this case, is satisfied. Here, the user ranks users based on the number of times the user is selected as the destination user. Let ( )berankofuser at time for source user. The rank of the user and the rank of the user are determined from the following inequalities: if if otherwise The user arranges users in descending order of the rank, and Fig. 2 shows an example of the user s ranking. With the ranks, the user classifies those users into the reliable group and the unreliable group according to the following rule: Rule: A user whose rank is smaller than is included in the reliable group. Otherwise, the user is included in the unreliable group. Figure 2 also shows how users are grouped according to this rule. In Fig. 2, is set to 2. Note that the user s ranking changes dynamically. B. Encounter counting In our proposed method, an user estimates the frequency of encountering each user. This estimation is utilized to avoid redundant message transmission. As shown in Sect. II-B, the friendship routing utilizes two indexes called SPM and CSPM to estimate the frequency of encounter. These indexes (3)

, March 12-14, 2014, Hong Kong Fig. 4. Proposed message transmission algorithm. are derived based on the remaining time until the next encounter. However, this estimation is somewhat difficult because the user has to store the remaining time for each user. In our proposed method, on the other hand, each user counts the number of encounters for other users. Here, let denote the number of encounters between user and until time. Figure 3 shows an example among users,, and. Moreover, as is the case with [2], an user exchanges the information about the number of encounters with other users. C. Transmission algorithm Finally, we explain our proposed message transmission algorithm. In our proposed method, in order to keep the reliability, a source user forwards the information about reliable group along with its corresponding message to an intermediate user. The intermediate user also forwards both the message and the information to the next user. When the destination user is,user determines whether the message is forwarded to user according to the following algorithm (see Fig. 4). 1) If user is the destination user,user forwards the message to the user.otherwise,gotostep2. 2) The user checks whether the user is included in the reliable group or not. If the user is included in the reliable group, go to step 3. Otherwise, go to step 4. 3) The user compares with.when is larger than, the user forwards the message to the user.otherwise,gotostep4. 4) The user does not forward the message to the user. Figure 5 shows an example of our proposed transmission algorithm. As shown in this figure, a message is forwarded to users in the reliable group except for the destination user. As shown in the previous subsections, the user s ranking changes dynamically. Therefore, the determination about the message transmission for each user also changes dynamically. IV. NUMERICAL EXAMPLES In this section, we evaluate the performance of our proposed method with simulation. In this simulation, the number of users is, and the users move within a square Fig. 5. An example of message transmission with our proposed transmission algorithm. whose size is 1000 1000. The initial position of each user is randomly selected and the direction of movement is also randomly selected. Moreover, the speed of movement is selected randomly from a uniform distribution [0, 3.0]. The direction of movement of a user is randomly selected again just before the user cuts across the square. In this case, the speed of movement does not change. We assume that the transmission range of each user is 20 and each message can be forwarded to users within the transmission range. Here, a message is generated for user per 50 unit time and user is selected as the destination user of the message with probability. In the following, follows a zipf distribution as follows: where when is smaller than and otherwise,. The generated message is disappeared after 5000 unit time. Moreover, we assume that a message that is generated by user is fabricated by user with probability.that is, a message is fabricated by a user with a high probability when the user is selected as a destination user with a low probability. In the above situation, we evaluate the performance of our proposed method, the epidemic routing, and the friendship routing. For the performance comparison, we calculate three performance metrics; delivery ratio, transmission efficiency, and fabricated ratio. Those metrics are calculated as follows: Delivery ratio Number of messages delivered to destination user Number of transmitted messages Transmission efficiency Delivery ratio Number of transmission hops Fabricated ratio Number of fabricated messages Number of transmitted messages (4) (6) (5)

, March 12-14, 2014, Hong Kong (a) A case where is equal to 0.001. (a) Transmission efficiency. (b) A case where is equal to 1.1. Fig. 6. Performance of each method when probability changes. A. Impact of probability First, we investigate the impact of probability with which user is selected as a destination user by user. Figures 6(a) and (b) show the performance of each method when changes from 0.034451 to 0.034568 ( ) and changes from 0.007126 to 0.28938 ( ), respectively. Here, the number of users is equal to 30. For our proposed methods, is equal to 10. We also evaluate the performance of our proposed method without the encounter counting process shown in subsection III-B. This result is denoted as Proposed w/o EC. From these figures, we find that the delivery ratio for the epidemic routing is the highest. This is because for this method a message is forwarded to all users within the transmission range. However, in the epidemic routing, the number of hops becomes large. Therefore, the transmission efficiency is the smallest. By using the friendship routing, the transmission efficiency is increased significantly by reducing the number of hops, as expected. On the other hand, for our proposed method, the transmission efficiency is larger than that for the friendship routing. This is because messages are forwarded to users in the reliable group and the number of hops is much small. Moreover, we find that the encounter counting process is effective to improve the transmission efficiency regardless of its (b) Fabricated ratio. Fig. 7. Performance of each method vs. parameter. simpleness. Moreover, the fabricated ratio for our proposed method is much smaller that for than other methods. This represents that our proposed method can transmit message reliably, as expected. B. Impact of parameters Next, we investigate the impact of setting parameter on the performance of our proposed method. Here, is equal to 30. Figures. 7(a) and (b) show the transmission efficiency and the fabricated ratio against, respectively. Note that the results for the epidemic routing and the friendship routing do not change because these methods do not utilize the parameter. From both the figures, we find that the transmission efficiency and the fabricated ratio of our proposed method decreases and increases as the parameter increases, respectively. This is because the number of users in the reliable group becomes large. Our proposed method is more effective than other methods regardless of. From the above results, our proposed method can increase the transmission efficiency and decrease the fabricated ratio significantly by changing. C. Impact of number of users Finally, we evaluate the performance of each method when the number of users changes. In the following, is set to 10.

, March 12-14, 2014, Hong Kong Fig. 8. (a) Transmission efficiency. (b) Fabricated ratio. Performance of each method vs. number of users. Figures 8(a) and (b) show the transmission efficiency and the fabricated ratio, respectively. From Fig. 8(a), we find that the transmission efficiency decreases as the number of users becomes large expect for our proposed method. Moreover, the fabricated ratio also is decreased by our proposed method. Therefore, our proposed method is effective regardless of the number of users. REFERENCES [1] I. Lequerica, M.G. Longaron, and P.M. Ruiz, Drive and Share: Efficient Provisioning of Social Networks in Vehicular Scenarios, IEEE Communications Magazine, vol. 48, no. 11, pp. 90 97, Nov. 2010. [2] E. Bulut and B.K. Szymanski, Friendship Based Routing in Delay Tolerant Mobile Social Networks, in Proc. IEEE Globecom 2010, Dec. 2010, pp. 1 5. [3] S.B. Eisenman, X. Zheng, and A.T. Campbell, Sensing Meets Mobile Social Networks: the Design, Implementation and Evaluation of the CenceMe Application, in Proc. the 6th ACM Conference on Embedded Networked Sensor Systems (SenSys 2008), Nov.2008. [4] J. Zhou, W. Wang, and L. Ge, Constructing Campus Mobile SNS Based on FOAF, in Proc. 2011 Second International Conference on Networking and Distributed Computing, Sept. 2011. [5] J. Burgess, B. Gallagher, D. Jansen, and B.N. Levine, MaxProp: Routing for Vehicle-Based Disruption Tolerant Networks, in Proc. IEEE INFOCOM 2006, Apr. 2006. [6] S.Chan,P.Hui,andK.Xu, Community Detection of Time-Varying Mobile Social Networks, in Proc. In Proc. of the First Int. Conf. on Complex Sciences: Theory and Applications, Feb.2009. [7] A. Vahdat and D. Becker, Epidemic Routing for Partially-Connected Ad Hoc Networks, Technical report, Duke University, 2000. [8] T. Spyropoulos, K. Psounis, and C.S. Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks, in Proc. ACM SIGCOMM workshop on Delay-tolerant networking 2005, pp. 252 259. [9] G. Chen and F. Rahman, Analyzing Privacy Designs of Mobile Social Networking Applications, in Proc. the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Dec. 2008. [10] J.I. Hong, J.D. Ng, S. Lederer, and J.A. Landay, Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems, in Proc. the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, Aug.2004. [11] M. Langheinrich, Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems, in Proc. the 3rd International Conference on Ubiquitous Computing (Ubicomp 2001), Sept. 2001. [12] C. Boldrini, M. Conti, and A. Passarella, Exploiting Users Social Relations to Forward Data in Opportunistic Networks: The HiBOp Solution, Pervasive and Mobile Computing, vol. 4, no. 5, pp. 633 657, 2008. [13] I. Parris, G. Bigwood, and T. Henderson, Privacy-enhanced social network routing in opportunistic networks, in Proc. the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom 2010), Mar./Apr. 2010. V. CONCLUSIONS AND FUTURE WORK In this paper, we proposed a reliable message transmission for mobile social networks. In our proposed method, users are classified into two groups and messages are forwarded to users in the reliable group. Moreover, the number of encounters for each user is counted, and this information is utilized to transmit messages effectively. For this method, we also considered a transmission algorithm. We evaluated with simulation the performance of our proposed method with a grouping rule. Numerical examples have shown that our proposed method is effective to avoid the fabrication of message, enhancing the reliability. Moreover, we found that the transmission efficiency is not degraded by using our proposed method. For our future work, we will extend this proposed method so that the other information such as community can be included. ACKNOWLEDGEMENT This work was supported partly by MIC SCOPE.